Topic 1: Volume A
In TCP communications there are 8 flags; FIN, SYN, RST, PSH, ACK, URG, ECE, CWR.
These flags have decimal numbers assigned to them:
FIN = 1
SYN = 2
RST = 4
PSH = 8
ACK = 16
URG = 32
ECE = 64
CWR = 128
Jason is the security administrator of ASPEN Communications. He analyzes some traffic
using Wireshark and has enabled the following filters.
What is Jason trying to accomplish here?
A.
SYN, FIN, URG and PSH
B.
SYN, SYN/ACK, ACK
C.
RST, PSH/URG, FIN
D.
ACK, ACK, SYN, URG
SYN, SYN/ACK, ACK
How do you defend against Privilege Escalation?
A.
Use encryption to protect sensitive data
B.
Restrict the interactive logon privileges
C.
Run services as unprivileged accounts
D.
Allow security settings of IE to zero or Low
E.
Run users and applications on the least privileges
Use encryption to protect sensitive data
Restrict the interactive logon privileges
Run services as unprivileged accounts
Run users and applications on the least privileges
How would you describe an attack where an attacker attempts to deliver the payload over
multiple packets over long periods of time with the purpose of defeating simple pattern
matching in IDS systems without session reconstruction? A characteristic of this attack
would be a continuous stream of small packets.
A.
Session Hijacking
B.
Session Stealing
C.
Session Splicing
D.
Session Fragmentation
Session Splicing
Maintaining a secure Web server requires constant effort, resources, and vigilance from an
organization. Securely administering a Web server on a daily basis is an essential aspect
of Web server security.
Maintaining the security of a Web server will usually involve the following steps:
1. Configuring, protecting, and analyzing log files
2. Backing up critical information frequently
3. Maintaining a protected authoritative copy of the organization's Web content
4. Establishing and following procedures for recovering from compromise
5. Testing and applying patches in a timely manner
6. Testing security periodically.
In which step would you engage a forensic investigator?
A.
1
B.
2
C.
3
D.
4
E.
5
F.
6
G.
7
4
Which of the following statement correctly defines ICMP Flood Attack? (Select 2 answers)
A.
Bogus ECHO reply packets are flooded on the network spoofing the IP and MAC
address
B.
The ICMP packets signal the victim system to reply and the combination of traffic
saturates the bandwidth of the victim's network
C.
ECHO packets are flooded on the network saturating the bandwidth of the subnet
causing denial of service
D.
A DDoS ICMP flood attack occurs when the zombies send large volumes of
ICMP_ECHO_REPLY packets to the victim system.
The ICMP packets signal the victim system to reply and the combination of traffic
saturates the bandwidth of the victim's network
A DDoS ICMP flood attack occurs when the zombies send large volumes of
ICMP_ECHO_REPLY packets to the victim system.
Page 5 out of 175 Pages |
Previous |